Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
14.207.196.2 attack
Unauthorized connection attempt from IP address 14.207.196.2 on Port 445(SMB)
2019-11-14 04:11:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.207.196.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45168
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.207.196.57.			IN	A

;; AUTHORITY SECTION:
.			330	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:34:36 CST 2022
;; MSG SIZE  rcvd: 106
Host info
57.196.207.14.in-addr.arpa domain name pointer mx-ll-14.207.196-57.dynamic.3bb.in.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.196.207.14.in-addr.arpa	name = mx-ll-14.207.196-57.dynamic.3bb.in.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.42.106.144 attack
Automatic report - Port Scan Attack
2019-11-14 22:18:47
184.71.191.126 attackbotsspam
RDP Bruteforce
2019-11-14 22:19:35
83.191.179.229 attackspambots
Telnetd brute force attack detected by fail2ban
2019-11-14 21:53:01
51.255.35.41 attack
Nov 14 09:45:06 SilenceServices sshd[30925]: Failed password for root from 51.255.35.41 port 36123 ssh2
Nov 14 09:48:38 SilenceServices sshd[31956]: Failed password for lp from 51.255.35.41 port 54828 ssh2
2019-11-14 21:48:36
37.59.158.100 attack
Nov 14 09:19:55 server sshd\[11346\]: Failed password for invalid user redweb from 37.59.158.100 port 54730 ssh2
Nov 14 15:26:40 server sshd\[12058\]: Invalid user ftpuser from 37.59.158.100
Nov 14 15:26:40 server sshd\[12058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-37-59-158.eu 
Nov 14 15:26:42 server sshd\[12058\]: Failed password for invalid user ftpuser from 37.59.158.100 port 55128 ssh2
Nov 14 15:37:11 server sshd\[15557\]: Invalid user web from 37.59.158.100
Nov 14 15:37:11 server sshd\[15557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-37-59-158.eu 
...
2019-11-14 21:53:56
200.0.50.200 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/200.0.50.200/ 
 
 BR - 1H : (337)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN262434 
 
 IP : 200.0.50.200 
 
 CIDR : 200.0.50.0/24 
 
 PREFIX COUNT : 24 
 
 UNIQUE IP COUNT : 11264 
 
 
 ATTACKS DETECTED ASN262434 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-14 07:19:15 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 22:20:46
51.68.122.216 attackbotsspam
SSH Brute Force, server-1 sshd[17945]: Failed password for invalid user name from 51.68.122.216 port 55996 ssh2
2019-11-14 22:04:54
187.188.131.85 attackbots
B: Magento admin pass test (wrong country)
2019-11-14 22:17:03
104.42.159.141 attackbotsspam
Invalid user matwork from 104.42.159.141 port 6080
2019-11-14 22:02:06
185.156.73.21 attackbotsspam
185.156.73.21 was recorded 33 times by 13 hosts attempting to connect to the following ports: 65013,65012,65011,44889,44887,44888. Incident counter (4h, 24h, all-time): 33, 160, 1078
2019-11-14 22:26:02
219.137.207.76 attackbotsspam
Multiple failed FTP logins
2019-11-14 22:14:46
79.173.216.107 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-14 21:56:00
167.250.163.51 attackspambots
UTC: 2019-11-13 port: 23/tcp
2019-11-14 22:12:22
77.199.87.64 attackbotsspam
Nov 14 13:31:02 v22018086721571380 sshd[31289]: Failed password for invalid user mysql from 77.199.87.64 port 33751 ssh2
2019-11-14 21:59:40
1.163.29.163 attackbotsspam
Port scan
2019-11-14 22:24:35

Recently Reported IPs

14.207.196.52 14.207.196.66 14.207.196.82 14.207.197.112
14.207.197.116 95.202.92.167 14.153.52.144 14.153.52.142
14.153.52.122 14.153.52.137 14.153.52.134 14.153.52.131
14.153.52.160 14.153.52.146 14.153.52.16 14.153.52.165
14.153.52.173 14.153.52.176 14.153.52.182 14.153.53.78